Analysis

  • max time kernel
    85s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2024 15:28

General

  • Target

    TRANSACCIÓN FR DE VENTA No FE183454.eml

  • Size

    21KB

  • MD5

    906df754f398cd8b2785799aede5457e

  • SHA1

    37c19ca3319c88ea3d56c1f55c3285c0e9c16889

  • SHA256

    d034dc322808e5197d59be36bb24713f59c5ff6d4a9f2e6ded124ec2caa9a8c8

  • SHA512

    64752cb2c33ff461d8a4217ec44c55ab976188bfd09d927bf76f5b5b0e45653124169ce0953ca66545058be4b41db302fe4cc887024c7d561ea7d0e945eb1cc7

  • SSDEEP

    384:hwq2q6sFTzPybUeCUCiCh5m5sju45d5mePp57CgbxrklL3J2Ges2ZTTCla:ehwzPz9nxTAsjuinVel43scTd

Malware Config

Extracted

Family

remcos

Botnet

Voltarger

C2

dfgdfghghfhfh.con-ip.com:1665

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-I3REIW

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\TRANSACCIÓN FR DE VENTA No FE183454.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" https://nam02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fuc%3Fexport%3Ddownload%26id%3D1JZSP43UkukRE__h72JIY9MUyDuY3f5hC&data=05%7C02%7Cdeyaniraolivera%40reincorporacion.gov.co%7Ca6b0ec373dcd41fec5b308dce86df438%7Cf98cdc17be3b46eabd8e04ae5bf545a8%7C0%7C0%7C638640806247980885%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C40000%7C%7C%7C&sdata=yJ9q9zu6umhVZ7tpS9ZN6gShcUOV09zHCdkcswTmh4k%3D&reserved=0
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1028 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:952
  • C:\Users\Admin\AppData\Local\Temp\Temp1_TRANSACCIÓN FR DE VENTA No FE183454.zip\TRANSACCIaN FR DE VENTA No FE183454.exe
    "C:\Users\Admin\AppData\Local\Temp\Temp1_TRANSACCIÓN FR DE VENTA No FE183454.zip\TRANSACCIaN FR DE VENTA No FE183454.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Users\Admin\AppData\Local\Temp\Temp1_TRANSACCIÓN FR DE VENTA No FE183454.zip\TRANSACCIaN FR DE VENTA No FE183454.exe
      "C:\Users\Admin\AppData\Local\Temp\Temp1_TRANSACCIÓN FR DE VENTA No FE183454.zip\TRANSACCIaN FR DE VENTA No FE183454.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    479e047f4a92520f4d8ea8a461295a1a

    SHA1

    736fc63e269cb302b950279d81d5db5d3533b331

    SHA256

    fd1fc30764cea6466b0c098d2dd90e2f120dd645d2b004a3bbc5e54e618cc0bd

    SHA512

    f4905a36c612f7f6666b0423eeab1eb98c6d958d821745d29f1dc01d3dc21cf16f197b52e9f444977ad1c18a21953cfbb231f696d4e22c52f3fd5aa31fc6c5ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f8c8a87100bcef480cff4a418627380

    SHA1

    a1c0a618efb396618d4b27986d16be00c8ebef93

    SHA256

    877e4e2f1658d85d311e3d0e14d9660c1f53895f3e1e2f9b944ebb2d5c39b886

    SHA512

    b00fe20649bf9278df78c420659b8e480f986fa75c4184c9921a15f895361c419bffaea284ef5950c3997b364b38ae1875af9088ecd00bf5c560d34fd9cf8b3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9bdabd313f04c400f8f42404031e5658

    SHA1

    ad386d8a647a1f4cb88f214a7d9ea3e56508c198

    SHA256

    c443dc139d1c0c83532858e1de2217b730c8f2b93405ae308f4b1c5820d3fd17

    SHA512

    f536b29149cfa31a6cd4954e567bdcdc6dcfc3800e094f7a111c5985ffc2e3474f2d0d8353ec30b58ecbb2d343ae35d7f93b344d7f6608a620724913b708e16e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5111298e4673d1e8d508b474be79995

    SHA1

    c84bd005c7eaf569f141028e55de9857a628ddfb

    SHA256

    aca1304c633cecf916a2f26e82359ec55e375f42943be04cac031196dffbd79f

    SHA512

    82b6f3b2d0dcf5a1f3e35ce911ac481a3ef398feda07b7e5315668560e61a2e0af646ef48ccef5129387e564f4e7f3779dea1d56029b0330984ac3b93d18d61e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e78f2840c16e6c02b79d98d950708e18

    SHA1

    af7b3e4c259bcdf7672f38a2bfd848d5ee362c89

    SHA256

    3ca66b6ab7d550c315da67c0202bd0cd84dff5461090612a36f824b8ffaed506

    SHA512

    5fb8ed5381ea888405cfcf202e59c9fa552b7b1b4e24e323048e62f033c8544730e06691573d43c53912d0b492200977a84cf1676f227c143718ee0a4c32e699

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51bcb470ba2b05fba3091a017210fa8a

    SHA1

    2059bc60784cac729343d72150f047cde86e7efc

    SHA256

    66990c8c275e1fceaabefa38525b2b0de28674d64dd4d11e0812a8d6f46e7c82

    SHA512

    3d50a3876f18419aca99ffa0147078b2f5aae4cdcd71c3b532882f9f8810490069e463c3bb61427db856358b887ce54c2df5674e1acdd9f12256aa533b496f63

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7600738026b2a6ed7082236e8575760

    SHA1

    438538c023e4afac190f8986bfbd6b2f29768faa

    SHA256

    05dc96be6351ba2f81132791fda2e05b0d052b134e21bd967a1d279da84b6c86

    SHA512

    796ce6bfbf7ee71f97ceffec14ad7134c90108f1d38e9a6806b0f8d5337d3d7f6c324d270b4f3fc51470875e13d81272ac4db8a84221b606e77562bdd3206759

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88a54f39724ab9296c8062761d248c99

    SHA1

    f2cde004c8fb9cb335cd383d586d7d999bf5d499

    SHA256

    2b70a72a57acfb0098a9175e5559188a3c367638b4ab1194a2dc448497eecc53

    SHA512

    996f5be3ef5f154b80f0f7c2ace16a8bf766bd706b3cbbc68f9a45c918d5d653b04bf404703e69339460c7565e81fcb4d70940eb9bd30df3a6bcf485443e9878

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    193d7896d8ffbcdb6ea877558f7ffc13

    SHA1

    569ff6d4f197765ca394a4221e5b8cd2536ba1a6

    SHA256

    601be0972e6ae9bd3b3108e07f55fdd316ae18d59db65c4fdd7a0ca7db1dc980

    SHA512

    adf4cb007d62487e7472fd0dfb2f7883e467aa04350f85001558875ba66f69043ec7aa26f342d99cc66ad574c2bb4f86b326cd8112eb217cb6b08ef9b35d04fa

  • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

    Filesize

    240KB

    MD5

    3424c5a263b8103a9ec9b1725b61a9ee

    SHA1

    3e0e0de63c8d2999177fdc66ff8bc19537a59048

    SHA256

    08897c65b9ad11af42b108adceecc68f69fab180a066c338105890205c2a8b6d

    SHA512

    106406fac76b36f49105107ea56e27615ca5a0db9b0a36020676606eb632db4c6610e8b712495dfbea16208b89562f95d2d67f6fef4e4e55c8e9acdec6c24525

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\guoemn1\imagestore.dat

    Filesize

    1KB

    MD5

    0c000d8adcc12fc0ad186fa86066dfa9

    SHA1

    b7abc62111229ff158f367c76be238cae9394765

    SHA256

    2654ba5b83402370412d8500814687d5c53999b4c1349b0e6a2658da32424c6f

    SHA512

    e173ae36d076682716c76368e31d3f81e86c1f93acd2c412d5b732e434fb5386dd15be10de21c332d09b038e968589118e6f1bf841256a7d7a920351b030f64a

  • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

    Filesize

    1KB

    MD5

    48dd6cae43ce26b992c35799fcd76898

    SHA1

    8e600544df0250da7d634599ce6ee50da11c0355

    SHA256

    7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

    SHA512

    c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\TRANSACCIÓN%20FR%20DE%20VENTA%20No%20FE183454[1].zip

    Filesize

    2.2MB

    MD5

    43141a5041515af1f9fb0540fa2ceb12

    SHA1

    160a6e7d32523496a969fe30a5fef7a0dace0ad8

    SHA256

    e25d06ac67c3d16046e0bf6ce284ebdd6a088d9e171f9dacb5d208eb328ad56d

    SHA512

    ed0e1599e206c057df274d7e96ba286e77cd0a80242781e28c9f1d74995738d7350d8dc6106a841dd5baa9f85a4a799d484683b64c8f4954191bb51ce01e6034

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WCATT3E5\drive_2022q3_32dp[1].png

    Filesize

    1KB

    MD5

    c66f20f2e39eb2f6a0a4cdbe0d955e5f

    SHA1

    575ef086ce461e0ef83662e3acb3c1a789ebb0a8

    SHA256

    2ab9cd0ffdddf7bf060620ae328fe626bfa2c004739adedb74ec894faf9bee31

    SHA512

    b9c44a2113fb078d83e968dc0af2e78995bb6dd4ca25abff31e9ab180849c5de3036b69931cca295ac64155d5b168b634e35b7699f3fe65d4a30e9058a2639bd

  • C:\Users\Admin\AppData\Local\Temp\Cab7AFD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7AFC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\{93E9F1D3-EF7E-45F0-B33A-F0680D9EC103}.html

    Filesize

    6KB

    MD5

    adf3db405fe75820ba7ddc92dc3c54fb

    SHA1

    af664360e136fd5af829fd7f297eb493a2928d60

    SHA256

    4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

    SHA512

    69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

  • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

    Filesize

    2B

    MD5

    f3b25701fe362ec84616a93a45ce9998

    SHA1

    d62636d8caec13f04e28442a0a6fa1afeb024bbb

    SHA256

    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

    SHA512

    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

  • memory/408-694-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-700-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-699-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-693-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-690-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-691-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/408-692-0x0000000000400000-0x0000000000968000-memory.dmp

    Filesize

    5.4MB

  • memory/1700-698-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1700-697-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1700-695-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1700-701-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1700-702-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1700-705-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1700-706-0x00000000001C0000-0x0000000000242000-memory.dmp

    Filesize

    520KB

  • memory/1796-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1796-1-0x000000007382D000-0x0000000073838000-memory.dmp

    Filesize

    44KB

  • memory/1796-124-0x000000007382D000-0x0000000073838000-memory.dmp

    Filesize

    44KB

  • memory/1796-164-0x000000006ADE1000-0x000000006ADE2000-memory.dmp

    Filesize

    4KB